2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2020
DOI: 10.1109/icsme46990.2020.00014
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(27 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…Nevertheless, dependency analysis has been a hot research topic for many other programming languages [38]- [44]. The concepts of these approaches, such as resolving compatibility issues caused by the evolution of libraries [45], [46], automated replacing outdated libraries [47], or updating deprecated library APIs [48], we believe, should also be appliable to Python software applications.…”
Section: Dependency Analysismentioning
confidence: 99%
“…Nevertheless, dependency analysis has been a hot research topic for many other programming languages [38]- [44]. The concepts of these approaches, such as resolving compatibility issues caused by the evolution of libraries [45], [46], automated replacing outdated libraries [47], or updating deprecated library APIs [48], we believe, should also be appliable to Python software applications.…”
Section: Dependency Analysismentioning
confidence: 99%
“…Some articles track and study the specific scenarios of using components with known vulnerabilities. Wang et al (Wang et al 2020) study usages, updates and risks of OSS in JAVA projects, and provide experiences on maintaining them as third-party libraries. Cadariu et al (Cadariu et al 2015) point out that the use of third-party components may introduce security vulnerabilities in the software system.…”
Section: Security Risk By Using Ossmentioning
confidence: 99%
“…However, improper use of OSS can cause *Correspondence: xulili@iie.ac.cn 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China Full list of author information is available at the end of the article potential serious security risks. Wang et al (Wang et al 2020) analyzed 806 software and pointed out that the use of outdated OSS is a common phenomenon, software containing outdated OSS is more likely to be exploited. For example, a severe security vulnerability called Heartbleed (Heartbleed 2020) was found in version 1.0.1 before 1.0.1g of OpenSSL, a popular cryptographic software library.…”
Section: Introductionmentioning
confidence: 99%
“…Developers are compelled to update their libraries in an effort to escape vulnerabilities, but the very fixes may also contain breaking changes. Wang et al, when studying the update risk of Java libraries have found that an impressive 35% of studied libraries, more than 4200 libraries, had more than 300 deleted APIs between a vulnerable version and its corresponding fix (WANG et al, 2020).…”
Section: Compatibility Often Breaksmentioning
confidence: 99%
“…Wang et al approach this phenomenon with various metrics, such as "usage outdatedness", "update intensity" and "update delay". They find that very few projects keep all their libraries up-to-date and more than 50% of projects take longer than 60 days to update dependencies (WANG et al, 2020).…”
Section: Compatibility Often Breaksmentioning
confidence: 99%